Posts By Andrey Zhuk

Mar 23, 2016 By Andrey Zhuk In Blog

Palo Alto NGFW & VMware NSX Integration- Use Cases Highlight Security Benefits

Everyone in IT has heard how Software Defined Networking (SDN) will change our world and that now, thanks to VMware and VMware’s NSX SDN solution, the Software Defined Data Center (SDDC) has become a reality. Of course, once you enter SDDC world, you have a new set of challenges: Lack of visibility into East-West (VM-to-VM) traffic Manual,...

Read More

Feb 24, 2016 By Andrey Zhuk In Blog

What to look for in a Next Generation Firewall (NGFW)

Your legacy Cisco ASA firewalls are nearing the end of life (EOL) and so now your boss has tasked you with selecting a new firewall solution. You’ve heard that the Next Generation Firewall (NGFW) is the next big thing when it comes to protecting network perimeters, but you really don’t know a lot about it. Where do you start? What do you...

Read More

Feb 10, 2016 By Andrey Zhuk In Blog

Advanced Persistent Threat (APT) – Revisiting the Definition

In today’s connected world, we hear a lot of talk about advanced persistent threats (APTs). In fact, the term “APT” is thrown around so often that many people have forgotten what it means. They just know it is something bad, relates to computers, and may be caused by a nation state. So I think it will be useful to revisit the definition...

Read More

Nov 19, 2015 By Andrey Zhuk In Blog

Translating the NIST Cybersecurity Framework into Practice

Translating the NIST Cybersecurity Framework into Practice
If you are an IT professional, you undoubtedly have heard of the NIST Cybersecurity Framework. And if you are an IT professional in the federal government, you have probably been in meetings with upper management discussing what the NIST Cybersecurity Framework guidance means for your agency. The problem that most technical folks have with...

Read More

Nov 06, 2015 By Andrey Zhuk In Blog

Endpoint Threat Detection & Response: The New Next of Cyber Security

How do you detect and respond to cyber incidents affecting your endpoint systems? (By endpoints, we are talking user laptops, application servers, tablets, handhelds, etc.) Your gut response is probably to think of your organization’s antivirus solution (e.g., Host Based Security System [HBSS]) and the protection it provides. But is that...

Read More

Oct 01, 2015 By Andrey Zhuk In Blog

Insights from Black Hat and DEFCON 2015: Where are SCADA Systems in Federal Government? (Hint: Just about everywhere)

In my previous blog entry, I described the different types of attacks that can be launched against Supervisory Control and Data Acquisition (SCADA) systems, including the ways attackers can monetize a SCADA system breach. Today’s blog provides examples of SCADA systems in the U. S. federal government. When we think of SCADA, images of smoking...

Read More

Sep 24, 2015 By Andrey Zhuk In Blog

Insights from Black Hat and DEFCON 2015. Apple OS X: False Sense of Security for the Desktop.

SEE UPDATE (Sept 24) BELOW Original August 26th blog: Have you ever wondered why Microsoft releases updates to its Windows operating system every week, while Apple releases updates for the OS X only a couple times a year? Many people, particularly Apple users, will say it’s because OS X is a superior and more secure operating system. Although...

Read More

Sep 23, 2015 By Andrey Zhuk In Blog

SCADA Industrial Controls – The Next Cyber Defense Frontier

SCADA Industrial Controls – The Next Cyber Defense Frontier
A rolling blackout of the entire U.S. East Coast, a multi-mile gas pipeline explosion, the next Three Mile Island nuclear reactor meltdown—all of these disasters can be created by a hacker exploiting vulnerabilities in industrial SCADA systems. What is SCADA? SCADA is an acronym for Supervisory Control and Data Acquisition. It generally...

Read More

Jun 11, 2015 By Andrey Zhuk In Blog

Part 2: Solving the Honeypot Dilemma: Countering: Dormant Threats Inside Your Agency’s Networks

In my last blog, we talked about the dilemma of using honeypots. On the one hand, honeypots can be a great way to catch the bad guys; on the other hand, they can be costly and, if the attackers are clever enough honeypots can actually be used against the agency. Here at SwishData, we constantly look for vendors with new and innovative...

Read More

Jun 09, 2015 By Andrey Zhuk In Blog

Part 1: Solving the Honeypot Dilemma: Countering: Dormant Threats Inside Your Agency’s Networks

“I write to inform you that we have discovered that CareFirst has experienced a sophisticated cyber attack that potentially allowed attackers to gain access to a limited portion of your personal information.” Those are the opening lines of a letter I received just two days ago. CareFirst also informed me that the company learned on April...

Read More

12